> Von: Ondřej Surý [mailto:ond...@sury.org]
> 
> On Tue, Oct 21, 2014, at 10:55, Fiedler Roman wrote:
> > > Von: Ondřej Surý [mailto:ond...@sury.org]
> > >
> > > Hi,
> > >
> > > TL;DR: "s/touch -c/touch -c -h/", right?
> >
> > This will fix it for arbitrary symlinks, the only remaining issues would
> > be
> >
> > a) keeping open a file ".. xxxx", which will update the parent directory
> > modification time.
> 
> Which parent directory? The session dir or the symlink targe parent
> directory?

The /var/lib directory: Since the the parsing of the lsof output is broken (awk 
uses "$9"), an open file ".. xxxx" will cause touch -c "/var/lib/php5/.." 
without involving any symlinks.
 
> > b) keeping open a file "[otherfilename] [random]", which will prevent
> > arbitrary other sessions from timing out. Since most likely malicious
> > process should be "www-data", this is not of any significance.
> 
> The httpd user (www-data) has access to all session files if the
> attacker know the session name.

Yes, so no relevance with "www-data". But e.g. user "nobody" could prevent any 
"www-data" session from timing out when knowing the name, just a subtle 
annoyance.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to